Security Line Card
  • Security Line Card
  • Key Trends
    • Security Frameworks
    • Zero Trust
    • Secure Access Service Edge
    • Secure & Protect The Cloud
    • Identity & Access Management (IAM)
    • Managed Security Services
    • Vulnerability Management
    • Security Awareness Training
    • Email & Endpoint Protection
    • Business Continuity
    • Ransomware Protection
  • Line Cards
    • Cloud Security Line Card
    • Consumer Technology ↗
    • DC/POS Line Card ↗
    • Emerging Business Group
    • Security Services (DXS) ↗
    • Smart Surveillance and Security Line Card ↗
    • UCC Line Card ↗
  • Resources
    • Business Transformation Center (BTC)
    • Digital Transformation Playbooks ↗
    • Financial Solutions ↗
    • Imagine Next ↗
      • Imagine Next Data Center ↗
      • Imagine Next Emerging Business Group ↗
      • Imagine Next Security ↗
      • Imagine Next Training ↗
    • Ingram Webinars & Events ↗
    • NIST Cybersecurity Framework
    • ONE Sales Tool ↗
    • Security Business Unit
    • Solution Design and Services
  • Login
Security Line Card
  • Security Line Card
  • Key Trends
    • Security Frameworks
    • Zero Trust
    • Secure Access Service Edge
    • Secure & Protect The Cloud
    • Identity & Access Management (IAM)
    • Managed Security Services
    • Vulnerability Management
    • Security Awareness Training
    • Email & Endpoint Protection
    • Business Continuity
    • Ransomware Protection
  • Line Cards
    • Cloud Security Line Card
    • Consumer Technology ↗
    • DC/POS Line Card ↗
    • Emerging Business Group
    • Security Services (DXS) ↗
    • Smart Surveillance and Security Line Card ↗
    • UCC Line Card ↗
  • Resources
    • Business Transformation Center (BTC)
    • Digital Transformation Playbooks ↗
    • Financial Solutions ↗
    • Imagine Next ↗
      • Imagine Next Data Center ↗
      • Imagine Next Emerging Business Group ↗
      • Imagine Next Security ↗
      • Imagine Next Training ↗
    • Ingram Webinars & Events ↗
    • NIST Cybersecurity Framework
    • ONE Sales Tool ↗
    • Security Business Unit
    • Solution Design and Services
  • Login

Ransomware Protection

Want to protect yourself from ransomware?
​Review this list to help guide your business in the right direction.

  • ​Review Current Security Posture - Identify current state and plan for where it needs to be​
  • Update and Patch all systems - Run scheduled checks to keep everything up-to-date
  • Use Next Gen Gateways - Block access to ransomware and other know malicious websites
  • Leverage Zero Trust methodology - Segment Networks, only provide access to what is needed, limit number of admin accounts
  • Use Anti-virus tools that include Zero-day and Anti-ransomware protection, as well as whitelisting allowed applications
  • Leverage Email Protection that supports AV, Sandboxing, and URL-Rewrites - Scan incoming and outgoing emails
  • Restrict Personal devices from corporate networks and applications
  • Regularly Backup Data - Have active backups, as well as offsite and disconnected backups, test regularly
  • Educate Employees - Train and educate staff on cyber security hygiene and provide them an escalation path for support
  • Enable Multi-factor Authentication on everything that supports it
  • Monitor devices and networks for anomalies and compromise (XDR, SIEM, MDR)
  • Use a 3rd party to test systems and security controls (Breach and Attack Simulations,  Penetration and Vulnerability Assessments)
  • Audit your supply chain and other 3rd parties  - Assess the security posture of your suppliers and business partners
  • Have an Incident Response Plan - Keep this plan updated as new tools and processes are implemented, know who to contact when breach occurs
  • Leverage managed services to get more eyes on your security posture - Managed services can provide 24x7 monitoring and response​

Ransomware 101

Get an introduction to the concept of Ransomware Protection

Ransomware 201

Get a deeper dive into the concept of Ransomware Protection

​Ingram Micro's top vendors in this space
  • Acronis – Nearly 40 percent of the victims who pay the ransom never get their data back — which is why everyone must protect against ransomware. Acronis Active Protection actively protects all of the data on your systems, including documents, media files, programs, and more — even your Acronis Backup Files.
  • Arcserve – Ransomware has become the biggest risk to business. Arcserve’s data and ransomware protection was designed to meet the demands of today’s IT by removing standalone, discrete products while delivering proven, all-in-one cybersecurity, backup, and disaster recovery (DR).
  • Bitdefender – Ransomware has quickly become one of the most infectious and feared threats in business environments. As an adaptive layered security solution, Bitdefender GravityZone provides multiple anti-ransomware capabilities, having all its layers work together for prevention, detection and remediation.
  • Check Point – Ransomware strikes without warning. It penetrates your organization through the web, email, or removable media devices. Check Point’s anti-ransomware solution defends organizations against the most sophisticated ransomware attacks, and safely recovers encrypted data, ensuring business continuity and productivity.
  • Cisco – Ransomware penetrates organizations in multiple ways, so fighting it requires more than one product. Cisco ransomware defense products provide ransomware protection from the DNS layer to email to the endpoint. And their solution is backed by industry-leading Talos threat research.
  • Crowdstrike – Ransomware is not new and an exponential growth curve has made it a pervasive threat to end users. Because attackers can and will shift their techniques, CrowdStrike’s next-generation endpoint protection solution, CrowdStrike Falcon, uses an array of complementary prevention and detection methods.
  • McAfee – Ransomware will install on your system, and encrypt or damage data on your system in a way that in many cases is irrecoverable unless you have a decryption key. McAfee’s free Ransomware Recover (Mr2) framework can unlock user files, applications, databases, applets, and other objects encrypted by ransomware.
  • Mimecast – Don’t be a ransomware statistic. The Mimecast ransomware protection solution tackles ransomware with a layered cyber resilience solution, bringing together data protection, business continuity, archiving, and recovery capabilities for your email from a single cloud solution.
  • Sonicwall – Ransomware is too lucrative to fade away. Eliminate ransomware with advanced multi-layered security services, including endpoint security, next-gen firewall services, email security and secure mobile access. Eradicate known, new and updated ransomware variants, and roll back endpoints to their prior clean state.
  • Sophos – Ransomware keeps evolving, getting faster, smarter — and costlier — at every turn. Sophos’ anti-ransomware educational toolkit for IT managers gives organizations free resources to train their users on ransomware, including an organizational checklist, security awareness posters, and an educational video for employees.
  • Trend Micro – Crypto Ransomware is a type of ransomware that encrypts files making them unusable by the user. To regain access, victims are asked to pay a ransom. Trend Micro’s free decryption tool decrypts certain variants of crypto ransomware, so you don’t have to pay up.
  • VMware Carbon Black – Today’s ransomware goes beyond simple file encryption and increasingly leverages unknown variants and file-less techniques. VMware Carbon Black’s cloud endpoint protection provides all types of ransomware on all endpoints. AppControl is the strongest ransomware protection for servers and critical systems.

Ransomware Protection Specialists
Picture
Jerry Diedrichs
Contact Jerry

Case studies/examples in action:
Don’t just take it from us—hear from industry experts about the importance of 
Ransomware Protection with case studies and other media.
  • CISA Ransomware Guide Sept. 2020
  • Global Ransomware and Cyberattacks on Healthcare Spike during Pandemic
  • A Malware Researcher’s Guide to Reversing Maze Ransomware
  • Petya Ransomware Goes Low Level
  • RANSOMWARE: an enterprise perspective (ESET)
  • Understanding Ransomware and Strategies to Defeat it (McAfee)
  • Ransomware Protection and Containment Strategies (Fireeye)
  • Ransomware: Attack Trends, Prevention, And Response (Check Point)
 

Recent examples:
See how a strong Ransomware strategy can help avoid breaches across industries and verticals.
​
  • Ransomware: Last Week Tonight with John Oliver (HBO)
  • Will U.S. Sanctions Disrupt Ransomware Business Models?
  • Secretary Mayorkas Urges Small Businesses to Protect Themselves Against Ransomware
  • Ryuk ransomware hit multiple oil and gas facilities, ICS security expert says
  • Cyber insurer Chubb had data stolen in Maze ransomware attack
  • Colonial Pipeline attack: Everything you need to know
  • What IT security teams can learn from the Colonial Pipeline ransomware attack​
  • CNA Financial Paid $40 Million in Ransom After March Cyberattack
 
​​
Training resources:
Learn more from industry experts.

  • Check Point Anti-Ransomware
  • What is Ransomware (CISA)
  • McAfee - What Is Ransomware?
  • Cofense - Ransomware Protection Resource Center
  • Acronis Ransomware Protection
  • Acronis - What is Ransomware?
  • Ransomware prevention with Mimecast
  • The State of Ransomware 2021 (Sophos)
  • Tackle Ransomware with Layered Security (Trend Micro)
  • How to prevent a ransomware attack?
  • NSA, CISA | Selecting and Hardening Remote Access VPN Solutions
Imagine Next Site Coming Soon
Security Services
2021 Key Trends
​Copyright © 2023 Ingram Micro.  All rights reserved.